Record ID | marc_columbia/Columbia-extract-20221130-031.mrc:63394276:6822 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:63394276:6822?format=raw |
LEADER: 06822cam a2200769 a 4500
001 15075920
005 20220827230338.0
006 m o d
007 cr cnu||||||||
008 090520s2009 flua ob 000 0 eng d
035 $a(OCoLC)ocn327055668
035 $a(NNC)15075920
040 $aHNK$beng$epn$cHNK$dCUS$dCEF$dVLB$dE7B$dOCLCQ$dB24X7$dOCLCQ$dDEBSZ$dSTF$dCRCPR$dN$T$dIDEBK$dCAUOI$dEBLCP$dS3O$dOCLCQ$dPIFBY$dOTZ$dOCLCQ$dUAB$dOCLCQ$dERL$dOCLCQ$dUPM$dAU@$dCOO$dUKMGB$dWYU$dS9I$dTYFRS$dUKAHL$dOCLCQ$dEYM$dSFB$dOCLCO$dDST$dOCLCQ
015 $aGBA901879$2bnb
015 $aGBB7B1167$2bnb
016 7 $a018394086$2Uk
016 7 $z014865820$2Uk
019 $a647813113$a708649655$a900343568$a901241892$a910291812$a935373227$a991939606$a994988958$a1031041515$a1058256764$a1064084551$a1086547046$a1260360717$a1300672844$a1303344498
020 $a9781420068405$q(electronic bk.)
020 $a1420068407$q(electronic bk.)
020 $a1322629692
020 $a9781322629698
020 $a9781466543386
020 $a1466543388
020 $a9780429119903$q(electronic bk.)
020 $a0429119909$q(electronic bk.)
020 $z9781420068399
020 $z1420068393
024 7 $a10.1201/9781420068405$2doi
035 $a(OCoLC)327055668$z(OCoLC)647813113$z(OCoLC)708649655$z(OCoLC)900343568$z(OCoLC)901241892$z(OCoLC)910291812$z(OCoLC)935373227$z(OCoLC)991939606$z(OCoLC)994988958$z(OCoLC)1031041515$z(OCoLC)1058256764$z(OCoLC)1064084551$z(OCoLC)1086547046$z(OCoLC)1260360717$z(OCoLC)1300672844$z(OCoLC)1303344498
037 $aTANDF_183421$bIngram Content Group
050 4 $aTK7872.D48
072 7 $aTEC$x040000$2bisacsh
082 04 $a681/.2$222
049 $aZCUA
245 00 $aSecurity in RFID and sensor networks /$cedited by Yan Zhang, Paris Kitsos.
260 $aBoca Raton :$bCRC Press,$c©2009.
300 $a1 online resource (1 volume (various pagings)) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $adata file
490 1 $aWireless networks and mobile communications
500 $a"An Auerbach book."
504 $aIncludes bibliographical references.
588 0 $aPrint version record.
505 0 $aFront Cover; Security in RFID and Sensor Networks; Contents; Editors; Contributors; Part I: Security in RFID; Chapter 1: Multi-Tag RFID Systems; 1.1 Introduction; 1.2 Multi-Tag Approach; 1.2.1 Optimal Placement of Multi-Tags; 1.3 Experimental Equipment and Setup; 1.4 Experimental Results; 1.4.1 Linear Antennas; 1.4.2 Circular Antennas; 1.5 Importance of Tag Orientation; 1.6 Controlling Experimental Variables; 1.6.1 Tag Variability; 1.6.2 Reader Variability; 1.7 Object Detection in the Presence of Metals and Liquids; 1.8 Effect of Object Quantity on Detection.
505 8 $a1.9 Effect of Multi-Tags on Anticollision Algorithms1.10 Multi-Tags as Security Enhancers; 1.10.1 Chaffing and Winnowing; 1.10.2 Preventing Side-Channel Attacks; 1.10.3 Splitting ID among Multi-Tags; 1.11 Applications of Multi-Tags; 1.11.1 Reliability; 1.11.2 Availability; 1.11.3 Safety; 1.11.4 Object Location; 1.11.5 Packaging; 1.11.6 Theft Prevention; 1.11.7 Tagging Bulk Materials; 1.12 Economics of Multi-Tags; 1.12.1 Costs and Benefits of Multi-Tags; 1.12.2 Tag Manufacturing Yield Issues; 1.12.3 RFID Demand Drivers; 1.12.4 Cost-Effective Tag Design Techniques.
505 8 $a1.12.5 Summary of Multi-Tag Economics1.13 Conclusion; Acknowledgment; References; Chapter 2: Attacking RFID Systems; 2.1 Introduction; 2.1.1 Background; 2.1.2 Attack Objectives; 2.1.3 Security Needs; 2.2 Main Security Concerns; 2.2.1 Privacy; 2.2.2 Tracking; 2.3 Tags and Readers; 2.3.1 Operating Frequencies and Reading Distances; 2.3.2 Eavesdropping; 2.3.3 Authentication; 2.3.4 Skimming; 2.3.5 Cloning and Physical Attacks; 2.3.6 Replay and Relay Attacks; 2.3.7 Hiding; 2.3.8 Deactivating; 2.3.9 Cryptographic Vulnerabilities; 2.4 Back-End Database; 2.4.1 Tag Counterfeiting and Duplication.
505 8 $a2.4.2 EPC Network: ONS Attacks2.4.3 Virus Attacks; References; Chapter 3: RFID Relay Attacks: System Analysis, Modeling, and Implementation; 3.1 Introduction; 3.2 Common Attacks on RFID Devices; 3.2.1 Replay Attacks; 3.2.2 Power Analysis Attacks; 3.2.3 Relay Attacks; 3.3 RFID System Model; 3.3.1 Application Software (APP); 3.3.2 Initialization and Anticollision Protocol (MAC); 3.3.3 Coder; 3.3.4 Modulator; 3.3.4.1 On-Off Keying (OOK); 3.3.4.2 Bipolar Phase Shift Keying (BPSK); 3.3.4.3 Amplitude Shift Keying (ASK); 3.3.5 Demodulator; 3.3.6 Channel; 3.4 System Architecture.
505 8 $a3.4.1 Channel Link Budget3.4.1.1 Received Power; 3.4.1.1.1 Tag to Reader Link Range Calculation; 3.4.2 Multi-Protocol Support; 3.4.2.1 Frequency Scanning; 3.4.2.1.1 FPGA; 3.4.2.1.2 Fractional-N Synthesizer; 3.4.2.1.3 Loop Filter; 3.4.2.1.4 VCO; 3.4.3 Smart Antennas; 3.4.3.1 Beamforming; 3.4.3.2 Beam-Selection; 3.4.3.3 Switch and Stay; 3.4.3.4 Switch and Compare; 3.4.4 Improving the Attack; 3.4.4.1 Improving the Security; 3.4.4.2 Increasing Channel Capacity; 3.4.4.3 General Implementation Comments on Smart Antennas; 3.5 System Delay; 3.6 Relay Attack Implementation; 3.6.1 Using the DSP.
520 $aIn the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, pr.
546 $aEnglish.
650 0 $aSensor networks$xSecurity measures.
650 0 $aRadio frequency identification systems$xSecurity measures.
650 6 $aRéseaux de capteurs$xSécurité$xMesures.
650 6 $aSystèmes d'identification par radiofréquence$xSécurité$xMesures.
650 7 $aTECHNOLOGY & ENGINEERING$xTechnical & Manufacturing Industries & Trades.$2bisacsh
650 7 $aRFID$xsäkerhetsaspekter.$2sao
650 7 $aTrådlösa lokala nätverk$xsäkerhetsaspekter.$2sao
655 4 $aElectronic books.
700 1 $aZhang, Yan,$d1977-
700 1 $aKitsos, Paris.
776 08 $iPrint version:$tSecurity in RFID and sensor networks.$dBoca Raton : CRC Press, ©2009$z9781420068399$w(DLC) 2008037932$w(OCoLC)166358473
830 0 $aWireless networks and mobile communications series.
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15075920$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS